{ "id": "CVE-2011-0803", "sourceIdentifier": "secalert_us@oracle.com", "published": "2011-04-20T03:14:06.003", "lastModified": "2011-04-20T04:00:00.000", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the JD Edwards EnterpriseOne Tools component in Oracle JD Edwards Products 8.9 GA through 8.98.4.1, and OneWorld Tools through 24.1.3, allows remote attackers to affect integrity and availability, related to Enterprise Infrastructure SEC." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente de JD Edwards EnterpriseOne de Oracle JD Edwards Products v8.9 GA hasta v8.98.4.1, y OneWorld Tools hasta v24.1.3, permite a atacantes remotos afectar a la integridad y disponibilidad, en relaci\u00f3n con Enterprise Infrastructure SEC." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 5.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:enterpriseone_tools:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "78A56CBF-DD52-4EC9-942D-062A2D5D4BD5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:budle14:*:*:*:*:*:*", "matchCriteriaId": "F2359221-692F-4226-B8BB-A045F4926DC8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle14:*:*:*:*:*:*", "matchCriteriaId": "42F9F31D-3074-4418-9566-5DB6C4367EF8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle21:*:*:*:*:*:*", "matchCriteriaId": "FA157884-D3C3-4866-BF66-AA10F93AF433" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle9:*:*:*:*:*:*", "matchCriteriaId": "DF51E618-EFF1-4978-8BFC-B845C8F664D8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9.18:*:*:*:*:*:*:*", "matchCriteriaId": "F2332EAE-75EE-415D-84A6-FE0A19D2C71B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "768E4605-1871-435B-8FB6-DDFBD17355CA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8DB2A4D7-4E33-42DC-ABA1-7F0C035974ED" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_ep:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "B73DAAFF-035F-4414-9A96-6A6862378FF0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:oneworld_tools:*:*:*:*:*:*:*:*", "versionEndIncluding": "24.1.3", "matchCriteriaId": "DE3F787C-209A-44A4-8637-2614AC4F4B0E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "B402D231-6B6D-4AC6-ABE8-BD4A0D3E5D4B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle23:*:*:*:*:*:*", "matchCriteriaId": "1A87B7C8-AD97-4AF1-A1B9-8B9D27D7B19D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle37:*:*:*:*:*:*", "matchCriteriaId": "DFF93D30-685A-45FA-A792-D4D3280F064D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle38:*:*:*:*:*:*", "matchCriteriaId": "153DA309-9ADA-44D2-A4B8-AAA2B0A5CDAB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle41:*:*:*:*:*:*", "matchCriteriaId": "1C51AFAB-4D6B-4A74-8EBF-4D246AFE3937" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:gp_2010-e:*:*:*:*:*:*", "matchCriteriaId": "E9C90A6C-A6C3-4AFD-901A-9BC3FCE47FD9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.98.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FB06098-BD09-43CB-988A-AC2C03B6A0C8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_suite_scm:8.9:bundle37:*:*:*:*:*:*", "matchCriteriaId": "AEC26BC4-778F-42BE-926F-AE9FC7394278" } ] } ] } ], "references": [ { "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ] } ] }